Montreal, QC
Thursday, April 6, 2023
Hybrid
Keynote Speaker
“"The New Frontline: Geopolitically Driven Cyber Threats and Risk in Financial Industry"”
MJF Rupom
Vice President & Head of Americas, Cyber Risk Intelligence BNP Paribas Canada
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Overlooked Entry Point: Preventing Supply Chain and Insider Threat Attacks
In this session, Moti Shkolnik, Firedome’s CEO will share insight into the most commonly overlooked entry point to supply chain and insider threat attacks.
Based on his unique background as an attacker in the field for 15 years, the session will address unique challenges and means of securing IoT enterprise devices to prevent organizational attacks.
Sponsored by
Presentation
Role of IAM and Log forensics in thwarting insider threats
Sponsored by
Networking
Presentation
We don’t know where we are compromised right now
When 7 out of 10 security leaders admit – “WE DON’T KNOW WHERE WE ARE COMPROMISED RIGHT NOW” – we have a problem – specifically a signal problem.
Sponsored by
Top 5 Ransomware Myths
The world’s largest taxi company doesn’t own any cars. The world’s largest accommodation company doesn’t own any property. And some of the largest ransomware groups are not deploying ransomware. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings. And the idea that we understand how ransomware works is one of the reasons why it is continuously on the rise. Join this session to learn about the latest innovations and business ideas that are shaping the world of cybercrime, and some of the ways how we can turn the modern ransomware ecosystem against itself.
Sponsored by
Networking
Lunch
Keynote
"The New Frontline: Geopolitically Driven Cyber Threats and Risk in Financial Industry"
In today’s world, geopolitical tensions have become a significant driver of cyber threats and risks, particularly in the financial industry. The increasing sophistication of cyberattacks, coupled with geopolitical instability, has created a new frontline for cybersecurity professionals. In this keynote, we will explore the evolving landscape of geopolitically driven cyber threats and risks facing the financial industry. We will examine the unique challenges that financial institutions face in this environment. We will also discuss the role of international cooperation in mitigating these threats and the need for a collaborative approach to cybersecurity. Ultimately, this keynote will provide insights into how financial institutions can proactively protect themselves against the ever-changing and increasingly complex geopolitical cyber risks and threats.
Networking
Presentation
Tokenizing the Dark Web : Applying NLP in the context of Cyber Threat Intelligence
To overcome the challenge of the distinct vocabulary used by malicious actors, we’ve created and made public the first open-source tokenizer trained on a corpus containing years of content from interactions on the Dark Web. The tokenizer and lexical are in the format of Byte-Pair-Encoding and will be available on GitHub.
We will demonstrate two applications of this model, applied to real world challenges and highlight some insights found by them. First, we will demonstrate how the ML auto-extractor is able to extract contents from a wide variety of illicit forums, without human configuration. Then, we will show how we were able to regroup multiple actors’ monikers based on their writing style.
What you would learn during this talk:
How to avoid the pitfalls when training NLP on slang/jargon.
How to continuously adapt the lexical to follow new trends in illicit communities.
With the release of this open-source model, malware researchers and threat hunters will be able to automate interactions with cybercriminals, support infiltration engagements, and analyze communications and data leaks. Additionally, by constantly updating the lexical based on cybercriminals’ interactions, the model allows researchers to discover and track rising trends.
Sponsored by
Presentation
The (hard) key to stop phishing: How Cloudflare stopped a targeted attack and you can too
In July 2022, Cloudflare was targeted in a sophisticated SMS phishing scheme in such a way that we believe most organizations would be likely to be breached. In this session we’ll detail the recent targeted phishing attack we saw at Cloudflare and more importantly, how we stopped it and steps you can take to protect your organization as well. We’ll cover topics like: why not all MFA is created equally, the role of Zero trust network access in rolling out strong authentication, and the importance of a blame-free culture around security.
Sponsored by
Networking
Presentation
How to Build an Insider Threat Program
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
- An automated investigation experience that replaces manual routines and effectively guides new insider threat teams